Author: Santosh Elumalai

As stated in the IoT Ransomware Attacks – Part 1 IoT ransomware is not just holding your data hostage, it can lead to denial of service until the demanded ransom is payed to the hackers, which is quiet a big market for hackers to see money. There will be greater threat for all industries using […]

Ransomware has already managed to carve itself a slot as one of the main cyber security threats in recent years. Individuals, government agencies, and private organizations are each taking precautionary steps to protect against ransomware that can encrypt files beyond one’s reach. What we’re ignoring though is the next wave of ransomware attacks which will […]

There may be a possible ‘second wave’ of massive global cyber attack, as SMB (Server Message Block) was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers release. The WannaCry emergency cannot be ended because the NSA Tools leaked by the Shadow Brokers team included many other dangerous […]

The blackhats have created a new strain of malware that targets the same vulnerability as the WannaCry ransomware from the first week of May. The Malware is called as EternalRocks, which uses the same flaw in Microsoft’s SMB networking protocol to infect other Windows systems that haven’t yet been patched with MS17-010. However, this new […]

Google has disclosed a Windows zero-day vulnerability in the Windows kernel that is currently being exploited in the wild by Black hats. This was disclosed after Microsoft failed to release a patch within the 7-day deadline. CVE-2016-7855 is a local privilege escalation vulnerability in the Windows kernel that can be used as a security sandbox escape. “[The vulnerability] […]

One of the major and serious threats on the internet today is malicious software, often referred to as a Malware. Malware, short form of malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. The malware being designed by attackers are polymorphic and […]